Sciweavers

2001 search results - page 377 / 401
» A security architecture for data privacy and security
Sort
View
AINA
2010
IEEE
14 years 5 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
16 years 2 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...
MSWIM
2005
ACM
15 years 7 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 2 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
IEEESP
2006
108views more  IEEESP 2006»
15 years 2 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven